Philipp Richter

Orcid: 0000-0003-2798-7207

According to our database1, Philipp Richter authored at least 50 papers between 2009 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Comprehensive and Reproducible Comparison of Clustering and Optimization Rules in Wi-Fi Fingerprinting.
IEEE Trans. Mob. Comput., 2022

Illuminating large-scale IPv6 scanning in the internet.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2020
A Survey on Coping With Intentional Interference in Satellite Navigation for Manned and Unmanned Aircraft.
IEEE Commun. Surv. Tutorials, 2020

To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI Today.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020

Who's left behind?: Measuring Adoption of Application Updates at Scale.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

DynamIPs: analyzing address assignment practices in IPv4 and IPv6.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table.
Proceedings of the Internet Measurement Conference, 2019

Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope.
Proceedings of the Internet Measurement Conference, 2019

In-lab validation of jammer detection and direction finding algorithms for GNSS.
Proceedings of the 9th International Conference on Localization and GNSS, 2019

PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Long-Term WiFi Fingerprinting Dataset for Research on Robust Indoor Positioning.
Data, 2018

Scanning the Internet for Liveness.
Comput. Commun. Rev., 2018

Attack tolerance of RSS-based fingerprinting.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Characterising the Alteration in the AP Distribution with the RSS Distance and the Position Estimates.
Proceedings of the 2018 International Conference on Indoor Positioning and Indoor Navigation, 2018

Advancing the Art of Internet Edge Outage Detection.
Proceedings of the Internet Measurement Conference 2018, 2018

Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
Proceedings of the 8th International Conference on Localization and GNSS, 2018

Opportunities and Challenges in the Industrial Internet of Things based on 5G Positioning.
Proceedings of the 8th International Conference on Localization and GNSS, 2018

2017
Empirical analysis of the effects and the mitigation of IPv4 address exhaustion.
PhD thesis, 2017

Ubiquitous and Seamless Localization: Fusing GNSS Pseudoranges and WLAN Signal Strengths.
Mob. Inf. Syst., 2017

Privilegierte Verarbeitung im BDSG-E.
Datenschutz und Datensicherheit, 2017

Wi-Fi Crowdsourced Fingerprinting Dataset for Indoor Positioning.
Data, 2017

Understanding the Share of IPv6 Traffic in a Dual-Stack ISP.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses.
Proceedings of the 2017 Internet Measurement Conference, 2017

Inferring BGP blackholing activity in the internet.
Proceedings of the 2017 Internet Measurement Conference, 2017

Analysis of crowdsensed WiFi fingerprints for indoor localization.
Proceedings of the 21st Conference of Open Innovations Association, 2017

2016
Lost in Space: Improving Inference of IPv4 Address Space Utilization.
IEEE J. Sel. Areas Commun., 2016

Big Data, Statistik und die Datenschutz-Grundverordnung.
Datenschutz und Datensicherheit, 2016

Instrumente zwischen rechtlicher Steuerung und technischer Entwicklung.
Datenschutz und Datensicherheit, 2016

A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Beyond Counting: New Perspectives on the Active IPv4 Address Space.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

2015
Revisiting Gaussian Process Regression Modeling for Localization in Wireless Sensor Networks.
Sensors, 2015

Datenschutz zwecklos? - Das Prinzip der Zweckbindung im Ratsentwurf der DSGVO.
Datenschutz und Datensicherheit, 2015

A Primer on IPv4 Scarcity.
Comput. Commun. Rev., 2015

Distilling the Internet's Application Mix from Packet-Sampled Traffic.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

A rigorous evaluation of Gaussian process models for WLAN fingerprinting.
Proceedings of the 2015 International Conference on Indoor Positioning and Indoor Navigation, 2015

2014
A survey of hybridisation methods of GNSS and wireless LAN based positioning system.
J. Ambient Intell. Smart Environ., 2014

Internetwahlen an Hochschulen.
Datenschutz und Datensicherheit, 2014

Die Zulässigkeit der Übertragung personenbezogener Daten in die USA im Kontext der NSA-überwachung.
Datenschutz und Datensicherheit, 2014

Bewertung von Internetwahlsystemen für Sozialwahlen.
Datenschutz und Datensicherheit, 2014

Lost in Space: Improving Inference of IPv4 Address Space Utilization.
CoRR, 2014

Peering at Peerings: On the Role of IXP Route Servers.
Proceedings of the 2014 Internet Measurement Conference, 2014

Back-Office Web Traffic on The Internet.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
Int. J. Inf. Secur. Priv., 2013

Schutzmaßnahmen gegen datenschutz- unfreundliche Smartphone-Apps.
Datenschutz und Datensicherheit, 2013

Modeling the German Legal Latitude Principles.
Proceedings of the Electronic Participation - 5th IFIP WG 8.5 International Conference, 2013

2012
Datenschutz durch Technik und die Grundverordnung der EU-Kommission.
Datenschutz und Datensicherheit, 2012

Ephemeral Materialization Points in Stratosphere Data Management on the Cloud.
Proceedings of the Transition of HPC Towards Exascale Computing, 2012

2011
Verbindung von CC-Schutzprofilen mit der Methode rechtlicher IT-Gestaltung KORA - Anwendungsbeispiel: Wahlgeheimnis.
Datenschutz und Datensicherheit, 2011

2010
The Virtual Polling Station - Transferring the Sociocultural Effect of Poll Site Elections to Remote Internet Voting.
Proceedings of the Electronic Voting 2010, 2010

2009
Developing a Legal Framework for Remote Electronic Voting.
Proceedings of the E-Voting and Identity, Second International Conference, 2009


  Loading...